Hi Kevin, It looks like you’re good with this certificate - I'm 99% sure, anyway :) This is how I checked for you - from:
https://www.namecheap.com/support/knowledgebase/article.aspx/9393/69/where-do-i-find-ssl-ca-bundle ...I downloaded the first CA Bundle in the list under Comodo, i.e.: PositiveSSL SHA-1 (also applicable for PositiveSSL Wildcard and PositiveSSL Multi-Domain) Unzipped the bundle, checked that it looked ok and confirmed the Serial Number: $ openssl x509 -in COMODO_PositiveSSL_SHA-1_bundle.crt -text -noout|grep "Serial Number" -A1 Serial Number: 07:6f:12:46:81:45:9c:28:d5:48:d6:97:c4:0e:00:1b Then I opened the CRT file with a cert installer/viewer tool (gcr-viewer, on Linux) to confirm what CA Root it would use, thus: AddTrust External CA Root Identity: AddTrust External CA Root Verified by: AddTrust External CA Root Expires: 05/30/2020 Certificate Fingerprints SHA1: 02 FA F3 E2 91 43 54 68 60 78 57 69 4D F5 E4 5B 68 85 18 68 MD5: 1D 35 54 04 85 78 B0 3F 42 42 4D BF 20 73 0A 3F ...and this SHA1 fingerprint matches a cert in
https://wiki.mozilla.org/CA:IncludedCAs Good luck! Cheers, James
James, seriously, thank you so much! I really really appreciate it. I am going to try to understand more about what you actually did, because unfortunately I'm not familiar enough with the inner workings of the https process (despite having read various wikipedia articles, etc, in the past). Anyway, for now, again, thank you!